Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe
Resource
win10v2004-20220812-en
General
-
Target
03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe
-
Size
979KB
-
MD5
23fe7f45473cb509c65b8e7d62210b40
-
SHA1
66842fba0fd099612c0b864ed145b17dea7360a9
-
SHA256
03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998
-
SHA512
5b79c781a0d3e60dcfc4461414023fabffba62b0247129dc7e673a645e81af9680b9c5f7a7df88d7193a4d019f87db1beab957746e7247888bfb69a66ade74d6
-
SSDEEP
12288:X/I8SxX6H5G+d3+Q/lbJwgXt06doUe2LDdX7G4oWZqCt5MOxz2IhR7LwQSX3fw1k:MuGW7zdx5XJZUAi/Xvo1f7sr8
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/852-55-0x0000000000400000-0x000000000049B000-memory.dmp family_isrstealer behavioral1/memory/852-56-0x0000000000401130-mapping.dmp family_isrstealer behavioral1/memory/852-67-0x0000000000400000-0x000000000049B000-memory.dmp family_isrstealer behavioral1/memory/1600-70-0x0000000074100000-0x00000000746AB000-memory.dmp family_isrstealer -
resource yara_rule behavioral1/memory/1160-61-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1160-65-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1160-66-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1160-68-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1160-69-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1600 set thread context of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 852 set thread context of 1160 852 vbc.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 852 vbc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 1600 wrote to memory of 852 1600 03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe 27 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28 PID 852 wrote to memory of 1160 852 vbc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe"C:\Users\Admin\AppData\Local\Temp\03c8fe9384be1b196bc0ac3fd578a16110fa73e16e64dda94ef6b93ee97cb998.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵PID:1160
-
-